KuppingerCole Report
Leadership Compass
By Anmol Singh

Privileged Access Management

Privileged Access Management (PAM), over the last few years, has evolved into a set of crucial technologies that addresses some of the most urgent areas of Cybersecurity today. Continuing the growth trajectory, the PAM market has entered a phase of consolidation characterized by increased price competition and an intensified battle for market share. This Leadership Compass provides a detailed analysis of the PAM market and its key players to help security and IAM leaders find the right product(s) that best fit their cybersecurity needs.

1 Introduction

The KuppingerCole Leadership Compass provides an overview of vendors and their product or service offerings in a certain market segment. This Leadersh ...

Login Get full Access

1.1 Market Segment

In the age of digital transformation, not only the requirements for IT, but also the way IT is done, are constantly evolving. To remain relevant, orga ...

Login Get full Access

1.2 Required Capabilities

In this Leadership Compass, we focus on solutions that help organizations reduce the risks associated with privileged access, through individual or sh ...

We look at all types of products that support customers in solving the Privileged Access Management challenges fully or partially. This includes, e.g. ...

Login Get full Access

2 Leadership

Selecting a vendor of a product or service must not be only based on the comparison provided by a KuppingerCole Leadership Compass. The Leadership Com ...

Login Get full Access

2.1 Overall Leadership

When looking at the Leader segment in the Overall Leadership rating, we see a picture that is a typical representation of evolving markets, where ther ...

Login Get full Access

2.2 Product Leadership

The first of the three specific Leadership ratings is about Product Leadership. This view is mainly based on the analysis of product/service features ...

Product Leadership is the view where we look specifically at the functional strength and completeness of products. Here, we find some more vendors tha ...

Login Get full Access

2.3 Innovation Leadership

Another angle we take when evaluating products/services concerns innovation. Innovation is, from our perspective, a key capability in IT market segmen ...

When looking at Innovation Leadership, we see a different picture. While most vendors still show gaps in functional completeness, affecting the Produc ...

Login Get full Access

2.4 Market Leadership

Finally, we looked at Market Leadership, i.e. the number of customers, the partner ecosystem, the global reach, and related factors affecting the lead ...

Here, we find CyberArk leading in the market leaders’ segment. CyberArk over these years has established itself as the most prominent vendor in the ...

Login Get full Access

3 Correlated View

While the Leadership charts identify leading vendors in certain categories, many customers are looking not only for, say, a product leader, but for a ...

Login Get full Access

3.1 The Market/Product Matrix

The first of these correlated views looks at Product Leadership and Market Leadership.

In this comparison, it becomes clear which vendors are better positioned in our analysis of Product Leadership compared to their position in the Marke ...

Login Get full Access

3.2 The Product/Innovation Matrix

The second view shows how Product Leadership and Innovation Leadership are correlated. It is not surprising that there is a pretty good correlation be ...

Vendors below the line are more innovative, vendors above the line are, compared to the current Product Leadership positioning, less innovative. Here, ...

Login Get full Access

3.3 The Innovation/Market Matrix

The third matrix shows how Innovation Leadership and Market Leadership are related. Some vendors might perform well in the market without being Innova ...

Vendors above the line are performing well in the market compared to their relative weak position in the Innovation Leadership rating, while vendors b ...

Login Get full Access

4 Products and Vendors at a glance

This section provides an overview of the various products we have analyzed within this KuppingerCole Leadership Compass on Privileged Access Managemen ...

Login Get full Access

4.1 Ratings at a glance

Based on our evaluation, a comparative overview of the ratings of all the products covered in this document is shown in this table.

Login Get full Access

In addition, we provide in the second table an overview which also contains four additional ratings for the vendor, going beyond the product view prov ...

Login Get full Access

The second table requires some additional explanation regarding the “critical” rating.

In Innovativeness, this rating is applied if vendors provide ...

Login Get full Access

5 Product/service evaluation

This section contains a quick rating for every product/service we’ve included in this KuppingerCole Leadership Compass document. For many of the pro ...

Login Get full Access

5.1 ARCON Privilege Account Management

Based in Mumbai (India), ARCON offers ARCON Privilege Account Management Suite to manage privileged access across a heterogenous mix of IT systems. AR ...

Login Get full Access

5.2 BeyondTrust PAM

US based BeyondTrust, a long-established PAM vendor, now represents the combined entity resulting from the notable acquisitions of Lieberman Software, ...

Login Get full Access

5.3 CA Privileged Access Management

New York based CA Technologies has enjoyed a rich and long history of being a leader in the Identity and Access Management market, mostly through the ...

Login Get full Access

5.4 Centrify Zero Trust Privilege Services

Based in the US, Centrify offers Centrify Zero Trust Privilege Services (formerly Centrify Infrastructure Services) as its comprehensive privileged ac ...

Login Get full Access

5.5 CyberArk Core Privileged Access Security

Headquartered in Israel and the US, CyberArk, has established itself as a leader in the Privileged Access Management market for a long time now. Origi ...

Login Get full Access

5.6 EmpowerID PAM

Based in Ohio (US), EmpowerID offers several products within its broader IAM portfolio, of which EmpowerID Privileged Access Management (PAM) is its r ...

Login Get full Access

5.7 FUDO Security PAM

Based in California, FUDO Security, previously Wheel Systems, offers FUDO PAM as its primary PAM product in the market. FUDO also offers FUDO Session ...

Login Get full Access

5.8 Hitachi ID Privileged Access Manager

Hitachi ID, headquartered in Canada, is a global IAM software provider that originated as MTech Information Technology and was acquired by Hitachi in ...

Login Get full Access

5.9 i-Sprint AccessMatrix Universal Credential Manager

Singapore based I-Sprint is an access management vendor that offers AccessMatrix Universal Credential Manager as its PAM product. With substantial pr ...

Login Get full Access

5.10 Krontech Single Connect

Based in Turkey, Krontech is the technology arm of Kron which is publicly listed on Istanbul stock exchange. Krontech offers Single Connect PAM suite ...

Login Get full Access

5.11 ManageEngine Password Manager Pro

Headquartered in Pleasanton, US, ManageEngine is a part of India-based Zoho Corporation that was founded in 1996. ManageEngine’s PAM product, Passwo ...

Login Get full Access

5.12 Micro Focus NetIQ Privileged Account Manager

UK based Micro Focus offers Micro Focus Privileged Account Manager as its primary PAM product that derives its origin from Novell and later NetIQ code ...

Login Get full Access

5.13 MT4 Networks SenhaSegura

Based in São Paulo, Brazil, MT4 Networks has several network management products of which Senhasegura is the flagship product. Comprised of multiple ...

Login Get full Access

5.14 One Identity PAM

California-based One Identity, a Quest Software Business, offers a good range of products aimed at managing and securing privileged access for organiz ...

Login Get full Access

5.15 Osirium PxM Platform

Based in UK, Osirium offers PxM platform that builds upon several products delivering privileged access management capabilities. This includes PAM (Pr ...

Login Get full Access

5.16 Sectona Spectra

Founded in 2017, Mumbai (India) based Sectona is the youngest of PAM market entrants and offers Spectra Privileged Access Management as its PAM produc ...

Login Get full Access

5.17 SSH.COM PrivX

Based in Helsinki, Finland, SSH.COM offers PrivX as its primary product in the PAM market. PrivX is a relatively new offering in the market by SSH.COM ...

Login Get full Access

5.18 Thycotic Secret Server

Based in Washington D.C. (US), Thycotic offers Secret Server platform as its primary PAM offering in the market. Secret Server is known for its compre ...

Login Get full Access

5.19 WALLIX Bastion

Based in France, WALLIX provides WALLIX Bastion as its primary PAM product in the market. At the core of Bastion is password management, session manag ...

Login Get full Access

6 Vendors to watch

Besides the vendors covered in detail in this Leadership Compass document, we observe some other vendors that offer notable Privileged Access Manageme ...

Login Get full Access

6.1 Deep Identity

Based in Singapore, Deep Identity is a regional provider of Identity Management software, offering Deep PIM as its primary PAM product which is essent ...

Login Get full Access

6.2 Devolutions

Canada based Devolutions offers Devolutions Password Server as its primary PAM product that provides password vaulting and password management targete ...

Login Get full Access

6.3 HashiCorp

San Francisco (US) based HashiCorp is a provider of application development and delivery management software for datacenters. Built on an open source ...

Login Get full Access

6.4 HelpSystems

Based in Minnesota (US), HelpSystems is a provider of security solutions targeted at IBM i-Series infrastructure. Its PowerTech portfolio is aimed at ...

Login Get full Access

6.5 IdentityAutomation

Houston (US) based IdentityAutomation is an IAM solution provider that offers RapidIdentity Privileged Access Management as its PAM product in the mar ...

Login Get full Access

6.6 Iraje

India based Iraje offers Privileged Identity Manager (PIM) as a complete PAM solution with a compelling feature set and the flexibility to customize a ...

Login Get full Access

6.7 MasterSAM

Singapore based MasterSAM, a part of Silverlake group, offers several separately licensed products aimed at managing privileged access. MasterSAM Star ...

Login Get full Access

6.8 NRI Secure Technologies

Japan based NRI Secure Technologies offers SecureCube Access Check primarily providing Privileged Session Management (PSM) capabilities. Operating in ...

Login Get full Access

6.9 ObserveIT

ObserveIT provides a comprehensive agent-based PSM platform that is deployable and scalable across a variety of IT systems. Offers detailed user behav ...

Login Get full Access

6.10 OnionID

US based OnionID takes a differentiated approach to privileged access management by offering multiple delivery options including PAM-as-a-Service, on- ...

Login Get full Access

6.11 Oracle

Based in California, Oracle is a popular and well-established software giant that offers Oracle Privileged Account Manager (OPAM) as its PAM product i ...

Login Get full Access

6.12 Remediant

Remediant is a new market entrant that takes an entirely distinctive zero-trust approach to PAM. Remediant offers SecureONE as its agentless and vault ...

Login Get full Access

6.13 Saviynt

California (US) based Saviynt is one of the leading providers of cloud based IGA services and makes its entry in the PAM market with a unique vault le ...

Login Get full Access

6.14 SecureLink

Based in Austin, Texas (US), SecureLink is a provider of secure remote access solutions as a PSM product targeted at managing privileges for third par ...

Login Get full Access

6.15 Venafi

US based Venafi offers TrustAuthority, a machine identity protection platform that also offers extensive SSH key management for securing privileged ac ...

Login Get full Access

6.16 XTON Technologies

Based in US, XTON Technologies is another notable market entrant that offers Xton Access Manager targeted at the PAM requirements of mid-market segmen ...

Login Get full Access

7 Related Research

Advisory Note: Identity & Access Management/Governance Blueprint - 70839
Advisory Note: IAM Predictions and Recommendations 2014-2018 - 71120
Advisory Note: Secure your Cloud against Industrial Espionage - 70997
Advisory Note: Cloud IAM: More than just Single Sign-On to Cloud Applications - 71031
Advisory Note: The new ABC for IT: Agile Businesses – Connected - 70998
Advisory Note: Connected Enterprise Step-by-step - 70999
Architecture Blueprint: Access Governance and Privilege Management - 79045
Executive View: ARCON Privilege Manager - 70950
Executive View: BeyondTrust PowerBroker for Unix & Linux - 70363
Executive View: CA Privileged Access Management Suite - 79047
Executive View: Centrify Next-Gen Access Platform - 79036
Executive View: Cloud Standards Cross Reference - 71124
Executive View: EmpowerID - 70894
Executive View: EU Guidelines for Cloud Service Level Agreements - 71154
Executive View: Vendor Overview CyberArk - 70280
Executive View: Hitachi ID Privileged Access Manager - 80030
Executive View: i-Sprint AccessMatrix Universal Sign-On - 71064
Executive View: Krontech SingleConnect - 80031
Executive View: ManageEngine Password Manager Pro - 70613
Executive View: Micro Focus Privileged Account Manager - 71314
Executive View: One Identity Safeguard - 79042
Executive View: Osirium: Privileged Access Management - 70836
Executive View: SSH.COM PrivX - 70302
Executive View: Thycotic Privilege Manager - 80004
Executive View: Wallix AdminBastion - 71266
Leadership Compass: Cloud IAM/IAG - 71121
Leadership Compass: Identity Provisioning - 71139
Leadership Compass: Enterprise Key and Certificate Management - 70961
Leadership Compass: Enterprise Single Sign-On - 70962
Leadership Compass: Privilege Management - 72330
Leadership Compass: Access Management and Federation - 71147
Leadership Compass: Access Governance & Intelligence - 71145



©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst company, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.